Follow us on Twitter  Watch our You Tube Channel  Add us on Linkedin  follow us on google plus


  • cyberark


  • axial


  • watchguard
  • smoothwall


  • snia


  • cpd-member
The UK’s premier event for Cyber Security, InfoSec and Risk Management Professionals and decision-makers looking to protect key public sector ICT assets and infrastructures

Information security remains a critical concern for the UK public sector and is fuelled by increased awareness of security challenges as the government  moves to consolidate all key back office functions and towards a digital by default model of service delivery. Securing critical information and assets, including the government’s ICT infrastructure, are vital to safeguarding against cyber espionage and attack as well as a range of other security threats such as criminal and negligent behaviour.

Whitehall Media’s 4th annual GovSec conference is geared around enabling government to function effectively, safely and securely through improved IT, information and infrastructural security. The all-day conference will explore how public sector organisations and professionals can make sense of securing their functions in a rapidly changing environment.

Join hundreds of senior IT, Cyber and Information Security professionals to discuss the threat landscape, opportunities to detect and defeat threats through appropriate skills and capabilities as well as best practice and approaches required to protect critical national systems and networks. Through a series of thought-leadership and case-study presentations, the conference will showcase the very best examples of how the public sector is building resilience and utilising technology to solve strategic security issues.

Featured Speakers

  • john thorntn

    John Thornton, Secretary, Digital Government Security Forum (DGSF)

    View more >>

  • claudia natanson

    Dr Claudia Natanson, Chief Security Officer, Department for Work and Pensions

    View more >>

  • neil glasson

    Neil Glasson, Head of IS Assurance, HM Land Registry

    View more >>

  • michael eva

    Michael Eva, Information Security Manager, London Borough of Camden

    View more >>

  • andrew brown

    Andrew Brown, UK Head of Business Development (ITAD), Sims Recycling Solutions

    View more >>

  • lizzie coles kemp

    Dr Lizzie Coles-Kemp, Senior Lecturer, Information Security Group, Royal Holloway, University of London (RHUL)

    View more >>

  • sadie bell

    Sadie Bell, Head of Information Governance, Solent NHS Trust

    View more >>

  • MohamedHamid

    Mohamed Hamid, Network Analyst, Cabinet Office

    View more >>

  • Sarah Clement

    Dr Sarah Clement, Senior Policy Officer, Information Commissioner’s Office

    View more >>

  • Alan Caton

    Allan Caton, IT Security and Information Governance Manager, London Borough of Tower Hamlets

    View more >>

Register NOW
Download the sponsorship packages
Meet the speakers
Previous Attendees
Meet the sponsors
WM Blogs


  • Governance, Regulation, Compliance Frameworks
  • Cloud Security Principles, Practice, Integration
  • Critical Infrastructure and Operational Technology Security
  • Securing Critical National Infrastructure
  • Cyber Essentials Scheme (CES)
  • Cyber Policy, Defence, Threat Intelligence
  • Cyber Risk Management / Insurance
  • Building Cyber Skills into Workforce and Leadership
  • Controlling Risks through Technology and Processes
  • Technical Surveillance Counter Measures
  • Cyber Policing / Incidence Detection / Response
  • Risk Management Frameworks, Metrics, Strategy
  • Data Protection, Legislation, Regulation, Confidentiality
  • Personnel Security / changing role of HR
  • Identity Assurance / Access Management
  • Information Security / Governance
  • Infrastructure Management and Security
  • Incident Sharing / Response
  • Encryption, Firewall technology, Anti-virus, cryptography, cryptanalysis
  • PSN / Network Security
  • Advanced Persistent Threats/Advanced Evasive Techniques
  • BYOD / End-User Device / Application Security
  • Digital Rights Management
  • Legacy Systems and Continuous Improvement Challenges
  • IaaS, PaaS, SaaS
  • Change Management/Programme Management
  • Business Continuity Management & Contingency Planning
  • Data Loss Prevention, Disaster Recover, Hardware Security
  • Social Media Challenges / Risks
  • Supply Chain Security
  • Detecting Espionage / Managing data theft and leakage
  • Securing Online Transactions/Digital by Default implementation